16. To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
A. True
B. False
Answer: A
17. Failure to control confidentiality may lead to loss of competitiveness.
A. True
B. False
Answer: A
18. Authorization tables contain highly sensitive data and should be protected by stringent security rules.
A. True
B. False
Answer: A
19. A transaction log shows before and after images of records that have been modified by transactions.
A. True
B. False
Answer: B
20. The greatest threat to business security is often internal rather than external.
A. True
B. False
Answer: A
More Questions & Answers:-
Page1 Page2 Page3 Page4 Page5 Page6
A. True
B. False
Answer: A
17. Failure to control confidentiality may lead to loss of competitiveness.
A. True
B. False
Answer: A
18. Authorization tables contain highly sensitive data and should be protected by stringent security rules.
A. True
B. False
Answer: A
19. A transaction log shows before and after images of records that have been modified by transactions.
A. True
B. False
Answer: B
20. The greatest threat to business security is often internal rather than external.
A. True
B. False
Answer: A
More Questions & Answers:-
Page1 Page2 Page3 Page4 Page5 Page6
No comments:
Post a Comment